nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blind separation method of overlapped multi-components based on time varying AR model
|
Cai, QuanWei |
|
2008 |
|
1 |
p. 81-92 |
artikel |
2 |
A characterization of answer sets for logic programs
|
Zhang, MingYi |
|
2007 |
|
1 |
p. 46-62 |
artikel |
3 |
A complete algorithm for automated discovering of a class of inequality-type theorems
|
Yang, Lu |
|
|
|
1 |
p. 33-49 |
artikel |
4 |
A fast and adaptive method for complex-valued SAR image denoising based on lk norm regularization
|
Wang, WeiWei |
|
2009 |
|
1 |
p. 138-148 |
artikel |
5 |
A fast learning algorithm of neural network with tunable activation function
|
Shen, Yanjun |
|
|
|
1 |
p. 126-136 |
artikel |
6 |
A functional presentation of Pi calculus
|
Fu, Yuxi |
|
|
|
1 |
p. 20-32 |
artikel |
7 |
Algebraic conditions of stability for hopfield neural network
|
Liao, Xiaoxin |
|
|
|
1 |
p. 113-125 |
artikel |
8 |
Almost sure convergence of iterative learning control for stochastic systems
|
Chen, Hanfu |
|
|
|
1 |
p. 67-79 |
artikel |
9 |
A new formal model for privilege control with supporting POSIX capability mechanism
|
Ji, Qingguang |
|
|
|
1 |
p. 46-66 |
artikel |
10 |
An ideal topology type convergent theorem on scale effect algebras
|
Wu, JunDe |
|
2007 |
|
1 |
p. 41-45 |
artikel |
11 |
An orthogonal basis for the hyperbolic hybrid polynomial space
|
Huang, Yu |
|
2007 |
|
1 |
p. 21-28 |
artikel |
12 |
A novel compensation-based recurrent fuzzy neural network and its learning algorithm
|
Wu, Bo |
|
2009 |
|
1 |
p. 41-51 |
artikel |
13 |
A novel complex-system-view-based method for system effectiveness analysis: Monotonic indexes space
|
Hu, Jianwen |
|
2006 |
|
1 |
p. 90-102 |
artikel |
14 |
A novel model on dynamic resource allocation in optical networks
|
Tang, Yong |
|
|
|
1 |
p. 15-27 |
artikel |
15 |
Application of asymptotic waveform approximation technique to hybrid FE/BI method for 3D scattering
|
Peng, Zhen |
|
2007 |
|
1 |
p. 124-134 |
artikel |
16 |
A pure quasi-human algorithm for solving the cuboid packing problem
|
Huang, WenQi |
|
2009 |
|
1 |
p. 52-58 |
artikel |
17 |
A schematic axiom for open congruence
|
Fu, Yuxi |
|
|
|
1 |
p. 67-77 |
artikel |
18 |
A unified approximate reasoning theory suitable for both propositional calculus system and predicate calculus system
|
Wang, Guojun |
|
|
|
1 |
p. 1-14 |
artikel |
19 |
Chessboard-interpolation-based multiple description video coding
|
Fan, Chen |
|
|
|
1 |
p. 66-74 |
artikel |
20 |
Collision attack on reduced-round Camellia
|
Wu, Wenling |
|
|
|
1 |
p. 78-90 |
artikel |
21 |
Communication contention in APN list scheduling algorithm
|
Tang, XiaoYong |
|
2009 |
|
1 |
p. 59-69 |
artikel |
22 |
Constructing parallel long-message signcryption scheme from trapdoor permutation
|
Hu, ZhenYu |
|
2007 |
|
1 |
p. 82-98 |
artikel |
23 |
Construction and enumeration of Boolean functions with maximum algebraic immunity
|
Zhang, WenYing |
|
2009 |
|
1 |
p. 32-40 |
artikel |
24 |
Corner block list representation and its application with boundary constraints
|
Hong, Xianlong |
|
|
|
1 |
p. 1-19 |
artikel |
25 |
Cova: A programming language for cooperative applications
|
Yang, Guangxin |
|
|
|
1 |
p. 73-80 |
artikel |
26 |
Cryptographic protocol security analysis based on bounded constructing algorithm
|
Li, Xianxian |
|
2006 |
|
1 |
p. 26-47 |
artikel |
27 |
Design of smooth orthogonal wavelets with beautiful structure from 2-band to 4-band
|
Peng, Lizhong |
|
2006 |
|
1 |
p. 128-137 |
artikel |
28 |
Fast frequency-domain equalization for single-carrier V-BLAST systems over multipath channel
|
Feng, Ang |
|
2009 |
|
1 |
p. 115-125 |
artikel |
29 |
Formal verification technique for grid service chain model and its application
|
Xu, Ke |
|
2007 |
|
1 |
p. 1-20 |
artikel |
30 |
Geometric constraint solving with geometric transformation
|
Gao, Xiaoshan |
|
|
|
1 |
p. 50-59 |
artikel |
31 |
Grading learning for blind source separation
|
Zhang, Xianda |
|
|
|
1 |
p. 31-44 |
artikel |
32 |
Investigation progress on key photonic integration for application in optical communication network
|
Wang, Qiming |
|
|
|
1 |
p. 60-66 |
artikel |
33 |
Joint multiple parameters estimation for coherent chirp signals using vector sensor array
|
Wen, Zhong |
|
2008 |
|
1 |
p. 93-100 |
artikel |
34 |
Lane of parallel through carry in ternary optical adder
|
Jin, Yi |
|
|
|
1 |
p. 107-116 |
artikel |
35 |
Linear cryptanalysis of NUSH block cipher
|
Wu, Wenling |
|
|
|
1 |
p. 59-67 |
artikel |
36 |
Linear multi-secret sharing schemes
|
Xiao, Liangliang |
|
|
|
1 |
p. 125-136 |
artikel |
37 |
Mathematic principles of interrupted-sampling repeater jamming (ISRJ)
|
Wang, XueSong |
|
2007 |
|
1 |
p. 113-123 |
artikel |
38 |
Medical image segmentation based on cellular neural network
|
Yao, Li |
|
|
|
1 |
p. 68-72 |
artikel |
39 |
Modeling and analyzing of the interaction between worms and antiworms during network worm propagation
|
Yang, Feng |
|
|
|
1 |
p. 91-106 |
artikel |
40 |
Multi-degree reduction of NURBS curves based on their explicit matrix representation and polynomial approximation theory
|
Cheng, Min |
|
|
|
1 |
p. 44-54 |
artikel |
41 |
Multi-degree reduction of tensor product Bézier surfaces with conditions of corners interpolations
|
Chen, Guodong |
|
|
|
1 |
p. 51-58 |
artikel |
42 |
Multiple stochastic paths scheme on partially-trusted relay quantum key distribution network
|
Wen, Hao |
|
2009 |
|
1 |
p. 18-22 |
artikel |
43 |
Multiple symbol differential detection based on sphere decoding for unitary space-time modulation
|
Li, Ying |
|
2009 |
|
1 |
p. 126-137 |
artikel |
44 |
Natural gradient-based recursive least-squares algorithm for adaptive blind source separation
|
Zhu, Xiaolong |
|
|
|
1 |
p. 55-65 |
artikel |
45 |
Neural networks and graph theory
|
Xu, Jin |
|
|
|
1 |
p. 1-24 |
artikel |
46 |
Neuro-fuzzy and model-based motion control for mobile manipulator among dynamic obstacles
|
Wei, Wu |
|
|
|
1 |
p. 14-30 |
artikel |
47 |
New approach to the automatic segmentation of coronary artery in X-ray angiograms
|
Zhou, ShouJun |
|
2008 |
|
1 |
p. 25-39 |
artikel |
48 |
New construction for expert system based on innovative knowledge discovery technology
|
Yang, BingRu |
|
2007 |
|
1 |
p. 29-40 |
artikel |
49 |
New theoretical bounds on the aperiodic correlation functions of binary sequences
|
Peng, Daiyuan |
|
|
|
1 |
p. 28-45 |
artikel |
50 |
Non-smooth finite-time stabilization for a class of nonlinear systems
|
Hong, Yiguang |
|
2006 |
|
1 |
p. 80-89 |
artikel |
51 |
Novel Ω-protocols for NP
|
Deng, Yi |
|
2008 |
|
1 |
p. 40-52 |
artikel |
52 |
On decidability and model checking for a first order modal logic for value-passing processes
|
Xue, Rui |
|
|
|
1 |
p. 45-59 |
artikel |
53 |
Optimal approximation of linear systems by artificial immune response
|
Gong, Maoguo |
|
2006 |
|
1 |
p. 63-79 |
artikel |
54 |
Output-threshold coupled neural network for solving the shortest path problems
|
Zhang, Junying |
|
|
|
1 |
p. 20-33 |
artikel |
55 |
Packet routing algorithm for polar orbit LEO satellite constellation network
|
Kaidong, Wang |
|
2006 |
|
1 |
p. 103-127 |
artikel |
56 |
Parallel compact integration in handwritten Chinese character recognition
|
Wang, Chunheng |
|
|
|
1 |
p. 89-96 |
artikel |
57 |
Partner selection model and soft computing approach for dynamic alliance of enterprises
|
Wang, Dingwei |
|
|
|
1 |
p. 68-80 |
artikel |
58 |
Polarization discrimination between repeater false-target and radar target
|
Shi, LongFei |
|
2009 |
|
1 |
p. 149-158 |
artikel |
59 |
Quasi-two-dimensional subthreshold current model of deep submicrometer SOI drive-in gate controlled hybrid transistors with lateral non-uniform doping profile
|
Huang, Ru |
|
|
|
1 |
p. 60-67 |
artikel |
60 |
Recursive functions of context free languages (I)
|
Dong, Yunmei |
|
|
|
1 |
p. 25-39 |
artikel |
61 |
Repair approach for DMC images based on hierarchical location using edge curve
|
Pan, Jun |
|
2009 |
|
1 |
p. 23-31 |
artikel |
62 |
Research progress of the fractional Fourier transform in signal processing
|
Tao, Ran |
|
2006 |
|
1 |
p. 1-25 |
artikel |
63 |
Reuse-based software production technology
|
Yang, Fuqing |
|
|
|
1 |
p. 8-19 |
artikel |
64 |
Scaling CMOS devices through alternative structures
|
Hu, Chenming |
|
|
|
1 |
p. 1-7 |
artikel |
65 |
Security extension for the Canetti-Krawczyk model in identity-based systems
|
Li, Xinghua |
|
|
|
1 |
p. 117-124 |
artikel |
66 |
Sequential stratified sampling belief propagation for multiple targets tracking
|
Xue, Jianru |
|
2006 |
|
1 |
p. 48-62 |
artikel |
67 |
Spectral clustering based on matrix perturbation theory
|
Tian, Zheng |
|
2007 |
|
1 |
p. 63-81 |
artikel |
68 |
Stability of switched nonlinear systems via extensions of LaSalle’s invariance principle
|
Wang, JinHuan |
|
2009 |
|
1 |
p. 84-90 |
artikel |
69 |
Study on the distribution law of random code structure of irregular LDPC codes and its application in eliminating short cycles
|
Ma, LinHua |
|
2007 |
|
1 |
p. 99-104 |
artikel |
70 |
Synthetic aperture radar tomography sampling criteria and three-dimensional range migration algorithm with elevation digital spotlighting
|
Tan, WeiXian |
|
2009 |
|
1 |
p. 100-114 |
artikel |
71 |
The completeness and applications of the formal system ℒ*
|
Pei, Daowu |
|
|
|
1 |
p. 40-50 |
artikel |
72 |
The essential order of approximation for neural networks
|
Xu, Zongben |
|
|
|
1 |
p. 97-112 |
artikel |
73 |
The Internet accessible mathematical computation framework
|
Wang, Paul S. |
|
|
|
1 |
p. 75-88 |
artikel |
74 |
Theory of (n) truth degrees of formulas in modal logic and a consistency theorem
|
Wang, GuoJun |
|
2009 |
|
1 |
p. 70-83 |
artikel |
75 |
Three-dimensional beam propagation method based on the variable transformed Galerkin’s method
|
Xiao, Jinbiao |
|
|
|
1 |
p. 34-43 |
artikel |
76 |
Time-accelerated integral equations for two-dimensional transient scattering problems
|
Wang, Jianguo |
|
|
|
1 |
p. 1-13 |
artikel |
77 |
Turbo iterative equalization for HSDPA systems
|
Wu, QiHui |
|
2007 |
|
1 |
p. 105-112 |
artikel |
78 |
Unparallel trajectory bistatic spotlight SAR imaging
|
Zhang, Lei |
|
2009 |
|
1 |
p. 91-99 |
artikel |
79 |
Using the multi-living agent concept to investigate complex information systems
|
Wang, Yue |
|
2008 |
|
1 |
p. 1-17 |
artikel |
80 |
Using the multi-living agent concept to investigate complex information systems
|
Wang, Yue |
|
2008 |
|
1 |
p. 1-17 |
artikel |